0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


The vulnerability management domain focuses on how organizations identify, analyze, and manage vulnerabilities in a critical service's operating environment. 1 Understanding how to identify, evaluate, and treat vulnerabilities is instrumental in the success of any organization. A successful vulnerability management program consists of 4 key elements: Vulnerability Assessment - Identifying weaknesses, risks, and exposures. Vulnerability Management tools - ...


In today’s information age, IT security is a necessary issue to consider. Operating systems vendors have developed numerous built-in features to prevent, detect, and investigate security incidents that happened to their systems. Windows auditing policy is a part of this endeavor. Windows auditing is Microsoft's mechanism for tracking events on its Windows environment, knowing who triggers such events, where ...


We're here to support you in your mission to learn and grow! Here are some new ways for you to learn what you need to succeed in the second half of 2020. We’ve added 7 courses (that are normally paid!) to your free membership for a limited time only! As part of our mission to provide the opportunity for personal ...


Machine Learning and Artificial Intelligence Artificial Intelligence (AI) and Machine Learning (ML) are the hottest two topics in computer science today. So much so that, if you can think of a problem, someone has tried to solve that problem with AI and ML. In most cases, AI and ML are, in fact, the solution. Because of these ...


What is Bash? Bash (Bourne Again Shell) is the command language interpreter or shell for the GNU/Linux operating system. It was named after Stephen Bourne, who was the author of the Bourne shell (sh). The Bash shell can be found on most GNU/Linux systems and, recently, on most Unix systems. What is a Shell? A shell is simply a program that ...


Cybersecurity is a diverse and growing field. There are many paths a professional may take to becoming a cybersecurity expert. Also, there are distinct practice areas within the world of cybersecurity. One person may be an expert in technical aspects of cybersecurity, while another person's specialty may focus on compliance. Regardless of the cybersecurity professional's role, understanding how information technology ...


What is a cyber-threat? You have probably heard the term cyber threat, as it is being used nowadays due to increased reliance on technology, but what does it actually mean? Cyber-threat refers to a malicious act that seeks to damage data, steal data, or disrupt digital life in general; such as computer viruses, data breaches, Denial of Service (DoS) attacks, or ...


Optimizing prevention, detection, and response in the cybersecurity challenges of tomorrow Data protection used to be relatively easy. Traditional firewalls would keep most of the external threats from getting into the company network, while antivirus software installed on endpoints would usually take care of those which did make it through. Additional layers of security, such as intrusion detection and prevention ...


For years, we have dreamed of the moment that we see unbelievably advanced technology, like flying cars, time machines, and many others, just like in the movies. Slowly, but surely, we take a step closer to that future. Many have dreams and hopes, and out of them, one stands above all. That reigning aspect would be none other than "Artificial ...


In this present day, you may receive phishing emails often, and some of us may even fall for such scams. Email Phishing attacks are by far the most common social attacks employed by cybercriminals and are on the rise. Phishing can also happen via text messages. The term phishing was coined because the scammers cast out a lure so that ...